Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Urban Fire Education: Seattle Case Study
"A major goal of the Office of Planning and Education (OPE), U.S. Fire Administration, is to identify effective local fire education programs and strategies, and distribute information about them nationwide. Other fire personnel can then choose to apply or adapt the programs and strategies to their own localities and needs. This case study is part of OPE's information sharing effort. Specifically, the study describes the fire education programs of the Seattle Fire Department. This department's comprehensive approach to fire education focuses on arson prevention and control as well as on general fire safety. It includes four major elements: Code Red, a program that promptly delivers a fire safety message to residents in a neighborhood that has recently experienced a fire; Fire Prevention Programs, special presentations designed to meet the needs of particular businesses and groups of citizens; School and Fire Safe Education, a program that reaches all 37,000 elementary school children in Seattle each year; and Arson Prevention Activities, a variety of public education and awareness efforts that have contributed to a 44 percent reduction in arson in Seattle since 1974."
United States. Federal Emergency Management Agency
Saily, Mary
1980-10
-
Lanchester-Type Models of Warfare, Volume II
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Lanchester-Type Models of Warfare, Volume I
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Department of the Interior Departmental Manual, Part 190: Emergency Preparedness, Chapter 1: Basic Organizational Arrangements
This U.S. Department of the Interior Departmental Manual, Part 190, Emergency Preparedness, Chapter 1 outlines the purpose, The Federal Structure for Emergency Preparedness, and The Interior Structure for Emergency Preparedness. This document 8/22/80 #3596 replaces 8/22/80 #2290.
United States. Department of the Interior
1980-08-22
-
Control of Weapon Data
It is necessary to differentiate between the handling of weapon data and other specialized or technical data because of its direct relationship to our nation's defense. The provisions of the Atomic Energy Act stipulate the control and dissemination of Restricted Data to assure the common defense and security. Weapon data is always Restricted Data, or Formerly Restricted Data, specifically that portion concerning the design, manufacture, or utilization of atomic weapons.
United States. Department of Energy
1980-08-01
-
Atlantic Hurricane Season of 1979
"This general summary of the 1979 hurricane season includes highlights of the season, comparisons of activity in recent years with long-term averages, and comments on large-scale atmospheric features that prevailed during the season and their impact on storm tracks. Finally, there are accounts of individual storms, which give meteorological details and the influence of synoptic features on their tracks and intensity."
National Hurricane Center (2012- )
1980-07
-
Guidelines for Security of Computer Applications
Security decisions should be an integral part of the entire planning, development, and operation of a computer application. This guideline describes the technical and managerial decisions that should be made in order to assure that adequate controls are included in new and existing computer applications to protect them from natural and human-made hazards and to assure that critical functions are performed correctly and with no harmful side effects. The multifaceted nature of computer security is described, and differences in security objectives, sensitivity levels, and vulnerabilities that must be considered are identified. Fundamental security controls such as data validation, user identity verification, authorization, journaling, variance detection, and encryption are discussed as well as security-related decisions that should be made at each stage in the life cycle of a computer application. These include questions about security feasibility and risk assessment that should be asked during initial planning, decisions that should be made during the design, programming and testing phases, controls that should be enforced during the development process, and security provisions that should be enforced during the day-to-day operation of the system.
United States. Department of Commerce
1980-06-30
-
Research into the Free Crystalline Silica Content of Mount St. Helens Ash
This report presents the findings of free silica in ash falling in Washington State from Mt. St. Helens. According to the report, researchers do not believe that short term exposure to the ash by the general population poses a significant health hazard. LLIS Core Capability: 1980: Mount St. Helens Volcanic Eruption; Public Health; Environmental Protection; Environmental Protection
United States. Federal Emergency Management Agency
1980-06-06?
-
Countermeasures to an Initial Surprise Attack Through the Analysis of Historical Examples
From the theses abstract: "This study attempts to deduce the countermeasures to an initial surprise attack through the analysis of historical examples. The research reveals that the defender must eliminate vulnerable timing in his reaction capabilities and develop his own doctrine, organization, and material based on his national character, terrain, climate, and the enemy's doctrine. To cope with the attacker's main attack directed toward an unexpected place, the defender capabilities must secure flexibility which could cope with any enemy Once the attacker has attacked, the defender's command structure should exactly identify the attacker's attempt as early as possible. To respond quickly to enemy's attempt, the defender should possess quick reaction capabilities and to respond effectively to the attacker's overpowering concentration of force and his speed of maneuver, the defender's maximum efforts must be focused on absorbing the attacker's attack momentum. Any countermeasure could not be accomplished without the soldiers' high morale. Those deduced countermeasures could be considered conceptual guidance in preparing for a surprise attack. The actual, substantial, and precise countermeasures should be researched, developed, and actualized nationally within the specific environments involved."
U.S. Army Command and General Staff College
Yoo, Je Hyun
1980-06-06
-
Nuclear Proliferation and Civilian Nuclear Power: Report of the Nonproliferation Alternative Systems Assessment Program
"The purpose of this volume is to assess the proliferation vulnerabilities of the present deployment of civilian nuclear-power systems within the current nonproliferation regime and, in light of their prospective deployment, to consider technical and institutional measures and alternatives which may contribute to an improved regime in which nuclear power could play a significant part. An assessment of these measures must include consideration of their nonproliferation effectiveness as well as their bearing upon energy security, and their operational, economic, and political implications. The nature of these considerations can provide some measure of their likely acceptability to various nations. While any final assessment of such measures and alternatives would have to examine the circumstances particular to each nation, it is hoped that the more generic assessments conducted here will be useful in suggesting guidelines for developing an improved nonproliferation regime which also helps to meet nuclear-energy needs."
United States. Department of Energy
1980-06
-
Design and Implementation of the Memory Manager for a Secure Archival Storage System
"This thesis presents a detailed design and implementation of a memory manger for a kernel technology based secure archival storage system (SASS). The memory manger is a part of the non-distributed portion of the Security Kernel, and is solely responsible for proper management of both the main memory (random access) and the secondary storage (direct access) of the system. The memory manager is designed for implementation on the ZILOG Z8000 microprocessor in a multi-processor environment. The loop free design structure, based upon levels of abstraction, and a segment aliasing scheme for information confinement are essential elements of the overall system security provided by the SASS."
Naval Postgraduate School (U.S.)
Gary, Alan V.; Moore, Edmund E.
1980-06
-
Study of Federal Immigration Policies and Practices in Southern California
"The California Advisory Committee submits this report of its study on Federal immigration policies and practices in southern California as part of its responsibility to advise the Commission on civil rights issues within this State. The purpose of the Advisory Committee's study was to supplement the Commission's national immigration effort and to document the effect of Federal immigration policies and practices on rights of minority aliens and U.S. citizens in southern California. The Advisory Committee held open meetings June 15 and 16, 1978, in Los Angeles and June 26, 1978, in San Diego to collect public testimony on immigration issues. The Advisory Committee invited representatives of community group to discuss their concerns and representatives of the U.S. Immigration and Naturalization Service to discuss their respective responsibilities for enforcing and administering Federal immigration laws. One basic finding of this report is that immigration enforcement efforts by the Federal Government are applied unequally to persons of Hispanic descent, thus affecting both constitutional and civil rights of aliens and U.S. citizens. A second major finding is that public service responsibilities within the Immigration and Naturalization Service are not emphasized to the same degree as enforcement functions."
United States Commission on Civil Rights
1980-06
-
Subversion: The Neglected Aspect of Computer Security
This thesis distinguishes three methods of attacking internal protection mechanisms of computers: inadvertent disclosure, penetration, and subversion. Subversion is shown to be the most attractive to the serious attacker. Subversion is characterized by three phases of operations: the inserting of trap doors and Trojan horses, the exercising of them, and the retrieval of the resultant unauthorized information. Insertion occurs over the entire life cycle of the system from the system design phase to the production phase. This thesis clarifies the high risk of using computer stems, particularly so-called 'trusted' subsystems for the protection of sensitive information. This leads to a basis for countermeasures based on the lifetime protection of security related system components combined with the application of adequate technology as exemplified in the security kernel concept.
Naval Postgraduate School (U.S.)
Myers, Philip A.
1980-06
-
DoD Directive 3025.1: Use of Military Resources During Peacetime Civil Emergencies within the United States, its Territories, and Possessions
"This Directive reissues reference (a), which establishes DoD policies, assigns responsibilities, and furnishes guidance for DoD support to civil authorities under peacetime civil emergency conditions within the United States."
United States. Department of Defense
1980-05-23
-
American Civil Defense 1945-1975: The Evolution of Programs and Policies
"This is a study of the evolution of civil defense policies and programs in the United States for the period 1945-1974. Written as a doctoral dissertation at the University of Virginia over a 3-year period (1978-1980), this study draws heavily on a large selection of executive and legislative branch hearings, reports, studies and government-sponsored research. It is reproduced in the belief that the information it contains will be of use to those conducting research in civil defense-related fields and to those responsible for the administration of civil defense programs."
United States. Federal Emergency Management Agency
Blanchard, B. Wayne
1980-05
-
Department of Defense Instruction 5030.36: Plan for the Security Control of Air Traffic and Air Navigation Aids, April 24, 1980
"This Instruction reissues reference (a), and transmits the revised 1975 SCATANA [Security Control of Air Traffic and Air Navigation Aids](enclosure 1) for information and guidance. SCATANA is an emergency preparedness plan that prescribes the joint action to be taken by appropriate elements of the Department of Defense, Federal Aviation Administration, and the Federal Communications Commission in the interest of national security to effect control of air traffic and air navigation aids under emergency conditions. Inquiries regarding this plan may be addressed to: North American Air Defense Command, Peterson Air Force Base, Colorado 80914."
United States. Department of Defense
1980-04-24
-
Declassification of the NRO
"In August 1980 the National Reconnaissance Office (NRO) will complete its second decade of successful operation, and can likely be accorded credit as the largest, longest, and most effective covert program in U.S. history. The systems designed, procured and operated by the NRO have played a major role in American national security, as well as in making possible strategic arms-control. This record of technical achievements and management effectiveness is both distinguished, and one which reflects well on those associated with the NRO. Since the 'declassification' of the National Security Agency in 1957 by publication of a three sentence description, the NRO presently remains the only major 'classified' element of the U.S. Intelligence Community, and in many ways a bureaucratic anomaly. In terms of its mission, there is nothing inherently more covert about the NRO than CIA's clandestine activities or the operations of NSA, both acknowledged QY the U.S. Government. Indeed, none of the 'abuses' associated with other elements of the Intelligence Community in the post-Watergate Congressional investigations can be associated with the NRO. As a practical matter, much about the NRO is an 'open secret.' The NRO name, mission, and several NRO programs have been the subject of increasing media discussion over the past several years, and the existence of the NRO is 'officially' confirmed by OSD (Public Affairs)."
United States. National Reconnaissance Office
1980-04-15
-
Computer Security Threat Monitoring and Surveillance
In computer installations in general, security audit trails, if taken, are rarely complete and almost never geared to the needs of the security officers whose responsibility it is to protect ADP assets. The balance of this report outlines the considerations and general design of a system, which provides an initial set of tools to computer system security officers for use in their jobs. The discussion does not suggest the elimination of any existing security audit data collection and distribution. Rather it suggests augmenting any such schemes with information for the security personnel directly involved.
National Institute of Standards and Technology (U.S.)
1980-04-15
-
Executive Order 12208: Consultations on the Admission of Refugees
"To the Secretary of State and the Attorney General, or either of them, the functions of initiating and carrying out appropriate consultations with members of the Committees on the Judiciary of the Senate and of the House of Representatives for purposes of Sections 101(a)(42)(B) and 207 (a), (b), (d), and (e) of the Immigration and Nationality Act, as amended (8 U.S.C. 1101(a)(42)[B) and 1157 (a), (b), (d), and [e)). (b) To the United States Coordinator for Refugee Affairs, the functions of reporting and carrying on periodic discussions under section 207(d)[l) of the Immigration and Nationality Act, as amended. (a) The functions vested in the United States Coordinator for Refugee Affairs by Section 1-lOl(b) of this Order shall be carried out in consultation with the Secretary of State, the Attorney General, and the Secretary of Health, Education, and Welfare. (b) The United States Coordinator shall notify the Committees on the Judiciary of the Senate and of the House of Representatives that the Secretary of State and the Attorney General, or either of them, wish to consult for the purposes of Section 207 (a), (b), or (d) of the Immigration and Nationality Act, as amended. The United States Coordinator for Refugee Affairs shall, in accord with his responsibilities under Section 301 of the Refugee Act of 1980 (8 U.S.C. 1525), prepare for those Committees the information required by 207(e) of the Immigration and Nationality Act, as amended."
United States. Office of the Federal Register
Carter, Jimmy, 1924-
1980-04-15
-
Indirect Costs of Residential Fires
"This report presents national estimates of indirect losses resulting from residential fires in the United States, where indirect losses are defined as costs other than direct property damage. Estimates of such losses, which include medical costs, temporary housing costs, lost wages, and a number of other components, are developed on the basis of survey information from a stratified random sample of 883 households which had experienced fires approximately four months prior to being interviewed. Two loss measures are used in the analysis. The first, total indirect losses, includes all indirect costs to which it was possible to assign a monetary value. Such losses are estimated at between $220.3 million and $322.6 million per year, depending on alternative assumptions concerning the total number of residential fires occurring in the United States. The second loss measure, out-of-pocket costs borne directly by households affected by fires, is estimated at between $105 million and $153.8 million per year. All of these cost estimates are subject to considerable statistical sampling error due to the relatively small sample on which they are based. In particular, it is estimated that the sampling error could easily be as much as plus-or-minus 28 percent of the specific loss estimates. In addition, there is some possibility of downward biases in the estimates because of difficulties in locating households which had moved as a result of particularly serious fires and because, particularly in the case of fires involving serious injuries, some costs may not have been incurred by the time of the survey. While such downward biases are possible, however, attempts to check the survey-based loss estimates against independently derived figures from other sources suggest that the estimates described here are in all likelihood at least of the correct order of magnitude."
United States. Federal Emergency Management Agency; National Fire Data Center (U.S.)
Munson, Michael J.; Ohls, James C.
1980-04
-
National Estimates of Indirect Fire Costs
"The objective of this study was to develop a national estimate of indirect residential fire costs which, when combined with an estimate of direct losses based on fire department fire reports, would yield an accurate overall picture of total losses as the result of reported residential fires in the United States. Since fire department reports typically include in their dollar loss estimates only damage directly done to buildings and contents, the subject of the present study, indirect fire costs, was operationally defined to include all costs other than the value of damage directly done to structures and their contents. In particular, the following categories of indirect costs were considered: medical costs, temporary shelter costs, costs of missed work, extra meal costs, funeral costs, demolition costs, cost of legal fees, and other similar, miscellaneous cost items which are not included in those explicit categories. Three categories of indirect fire costs which had to be omitted from the cost calculations presented in this chapter should be noted. First, and perhaps most important, no attempt has been made to place a monetary value on the pain, both physical and psychological, experienced by fire victims and their friends and relatives as a result of the fires. Fires often have devastating nonmonetary impacts because of such factors as deaths, injuries, dislocation, loss of cherished and irreplaceable possessions, and trauma. Indeed, in many cases such costs may be greater in magnitude than those to which monetary values can be assigned."
United States. Federal Emergency Management Agency; United States Fire Administration
1980-04
-
International Terrorism in 1979
This research paper produced by the Central Intelligence Agency in April 1980 provides graphs and analysis of international terrorist acts for the year of 1979. Topics discussed include trends, the numbers of total deaths from acts of terrorism, geographic distribution of acts, state supported terrorism and a breakdown of the nationality of victims of terrorist attacks.
United States. Central Intelligence Agency
1980-04
-
Convention on the Physical Protection of Nuclear Material
The Convention on the Physical Protection of Nuclear Material provides for certain levels of physical protection during international transport of nuclear material and establishes a general framework for cooperation among states in the protection, recovery, and return of stolen nuclear material. Further, the Convention lists certain serious offenses involving nuclear material which state parties are to make punishable and for which offenders shall be subject to a system of extradition or submission for prosecution.
United States. Department of State. Bureau of Nonproliferation
1980-03-03
-
Outdoor Warning Systems Guide
"The purpose of this guide is to set forth the basic principles of sound that are applicable to audible outdoor warning devices and to describe a method for planning and laying out an effective outdoor warning system. This guide concentrates on the selection, siting, and operation of audible outdoor warning devices."
United States. Federal Emergency Management Agency
1980-03
-
Assessment of Various Aspects of This Nation's Nuclear Safeguards Programs
Protecting nuclear material from violent use against society has been an issue at the very heart of the nuclear energy debate from its beginning. A review was made to determine the effectiveness of the Department of Defense's (DOD) nuclear safeguards system and to compare that system to the systems used by the Department of Energy (DOE) and the Nuclear Regulatory Commission (NRC) who are also responsible for the security of nuclear weapons or nuclear weapons-grade materials against theft, diversion, or sabotage. In addition, the on-site security at a number of sites within the responsibility of each of these agencies was investigated by interviewing site officials and employees, touring the sites, and by testing various elements of the security system. DOD is responsible for the security of nuclear weapons and for the security of nuclear weapons-grade materials found in research reactor fuel and in fuel for naval propulsion reactors. In carrying out this responsibility, DOD has established minimum standard security requirements that are to be met by its nuclear facilities. At five weapon sites that were reviewed, it was discovered that while all of the sites met most of the minimum requirements, each one needed important improvements before all of the requirements would be met. With regard to DOD's research reactor and naval fuel storage facilities, the security appeared to be adequate. Some minor improvements could be made, but their importance to the overall security of the facility was not significant. Like DOD, NRC and DOE are also responsible for protecting the public against the hazards of theft, diversion, or sabotage of nuclear materials. While all three agencies are responsible for large amounts of nuclear materials, DOD and DOE also have custody of nuclear weapons themselves. Each agency designs its security system to what it believes to be the existing threat, and each has different estimates of what that threat is. These different threat levels have resulted in a situation where similar nuclear materials are receiving different levels of protection.
United States. General Accounting Office
1980-02-19
-
Department of Defense Directive 4640.1: Telephone Monitoring and Recording
"This Directive updates the policy and procedures concerning monitoring and recording of telephone conversations over DoD-owned or leased telephone communication systems for office and communications management, command center communications, and American Forces Radio and Television Service."
United States. Department of Defense
1980-01-15
-
Presidential Directive 55: Intelligence Special Access Programs: Establishment of the APEX Program
In this Directive, President Carter approves the "establishment of the APEX program, a single special access system to protect particularly sensitive intelligence sources and methods. APEX conforms with Executive Order 12065 and will be implemented for the National Security Council by the Director of Central Intelligence as the Council's Executive Agent. The National Security Council will be the Forum for any appeals arising during implementation of the APEX program. The APEX program will control the nature, attributable collected information, and operational details of the most sensitive intelligence sources and methods, as determined by the Director of Central Intelligence. Uniform security standards established by the Director of Central Intelligence will govern access to, distribution of, and protection of intelligence sources and methods, subject to any specific statutory requirements applicable to any department or agency."
United States. White House Office
1980-01-10
-
DoD Directive 5200.27: Acquisition of Information Concerning Person and Organizations not Affiliated with the Department of Defense
This Directive reissues reference DoD Directive 5200.27, subject as above, December 8, 1975 (hereby canceled) to establish for the Defense Investigative Program general policy, limitations, procedures, and operational guidance pertaining to the collecting, processing, storing, and disseminating of information concerning persons and organizations not affiliated with the Department of Defense.
United States. Department of Defense
1980-01-07
-
Executive Order 12188: International Trade Functions
"Except as may be otherwise expressly provided by law, the United States Trade Representative (hereinafter referred to as the 'Trade Representative') shall be chief representative of the United States for: (1) all activities of, or under the auspices of, the General Agreement on Tariffs and Trade; (21 discussions, meetings, and negotiations in the Organization for Economic Cooperation and Development when trade or commodity issues are the primary issues under consideration; (3) negotiations in the United Nations Conference on Trade and Development and other multilateral institutions when trade or commodity issues are the primary issues under consideration; (4) other bilateral or multilateral negotiations when trade, including East-West trade, or commodities is the primary issue under consideration."
United States. Office of the Federal Register
Carter, Jimmy, 1924-
1980-01-02
-
An Assessment of the West Bank and Gaza Autonomy Talks, November 1980, Hearing before the Subcommittee on Europe and the Middle East of the Committee on Foreign Affairs, House of Representatives, Ninety-Sixth Congress, Second Session, November 21, 1980
This is the November 21, 1980 hearing titled "An Assessment of the West Bank and Gaza Autonomy Talks," held before the House Subcommittee on Europe and the Middle East of the Committee on Foreign Affairs. From the opening statement of Lee H. Hamilton: "Critical issues in the West Bank and Gaza talks, involving both serious security concerns of the Israelis and the legitimate rights of the Palestinians of the West Bank and Gaza to a greater voice in their own affairs are matters which must be satisfied if any meaningful peace is to be achieved." Statements, letters, and materials submitted for the record include those of the following: Sol M. Linowitz.
United States. Government Publishing Office
1980